You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Good afternoon everybody,
I was able to ingest documents into the database, according to the langchain method below, but the return is an ingestion of malicious code on my page, as shown in the print below. Does anyone else have this vulnerability?
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Good afternoon everybody,
I was able to ingest documents into the database, according to the langchain method below, but the return is an ingestion of malicious code on my page, as shown in the print below. Does anyone else have this vulnerability?
const vectorstore = await SupabaseVectorStore.fromDocuments(
splittedDocuments,
embeddings,
{
client,
tableName: "documents",
queryName: "match_documents",
},
);
[cause]: Error: Error searching for documents: undefined <script type="text/javascript">location.replace("https://malware.opendns.com/?url=MY_PASSWORD.supabase.co%2Frest%2Fv1%2Frpc%2Fmatch_documents&server=nyc4&prefs=&tagging=&nref");</script>
Beta Was this translation helpful? Give feedback.
All reactions